A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing
Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it into parts such that some predetermined subsets of partitions can recover the secret but remaining subsets cannot. In 1979, the pioneer construction on this area was given by Shamir and Blakley indepen...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Yildiz Technical University
2019-09-01
|
Series: | Journal of Algebra Combinatorics Discrete Structures and Applications |
Online Access: | http://jm.jacodesmath.com/index.php/jacodesmath/article/view/303 |
id |
doaj-83cfddd531de4a6faef18799d15b30a9 |
---|---|
record_format |
Article |
spelling |
doaj-83cfddd531de4a6faef18799d15b30a92020-11-25T01:10:24ZengYildiz Technical UniversityJournal of Algebra Combinatorics Discrete Structures and Applications2148-838X2019-09-0163124A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharingIbrahim OzbekFatih TemizIrfan SiapSecret sharing scheme is an efficient method to hide secret key or secret image by partitioning it into parts such that some predetermined subsets of partitions can recover the secret but remaining subsets cannot. In 1979, the pioneer construction on this area was given by Shamir and Blakley independently. After these initial studies, Asmuth-Bloom and Mignotte have proposed a different $(k,n)$ threshold modular secret sharing scheme by using the Chinese remainder theorem. In this study, we explore the generalization of Mignotte's scheme to Euclidean domains for which we obtain some promising results. Next, we propose new algorithms to construct threshold secret image sharing schemes by using Mignotte's scheme over polynomial rings. Finally, we compare our proposed scheme to the existing ones and we show that this new method is more efficient and it has higher security.http://jm.jacodesmath.com/index.php/jacodesmath/article/view/303 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ibrahim Ozbek Fatih Temiz Irfan Siap |
spellingShingle |
Ibrahim Ozbek Fatih Temiz Irfan Siap A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing Journal of Algebra Combinatorics Discrete Structures and Applications |
author_facet |
Ibrahim Ozbek Fatih Temiz Irfan Siap |
author_sort |
Ibrahim Ozbek |
title |
A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing |
title_short |
A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing |
title_full |
A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing |
title_fullStr |
A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing |
title_full_unstemmed |
A generalization of the Mignotte's scheme over Euclidean domains and applications to secret image sharing |
title_sort |
generalization of the mignotte's scheme over euclidean domains and applications to secret image sharing |
publisher |
Yildiz Technical University |
series |
Journal of Algebra Combinatorics Discrete Structures and Applications |
issn |
2148-838X |
publishDate |
2019-09-01 |
description |
Secret sharing scheme is an efficient method to hide secret key or secret image by partitioning it into parts such that some predetermined subsets of partitions can recover the secret but remaining subsets cannot. In 1979, the pioneer construction on this area was given by Shamir and Blakley independently. After these initial studies, Asmuth-Bloom and Mignotte have proposed a different $(k,n)$ threshold modular secret sharing scheme by using the Chinese remainder theorem. In this study, we explore the generalization of Mignotte's scheme to Euclidean domains for which we obtain some promising results. Next, we propose new algorithms to construct threshold secret image sharing schemes by using Mignotte's scheme over polynomial rings. Finally, we compare our proposed scheme to the existing ones and we show that this new method is more efficient and it has higher security. |
url |
http://jm.jacodesmath.com/index.php/jacodesmath/article/view/303 |
work_keys_str_mv |
AT ibrahimozbek ageneralizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing AT fatihtemiz ageneralizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing AT irfansiap ageneralizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing AT ibrahimozbek generalizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing AT fatihtemiz generalizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing AT irfansiap generalizationofthemignottesschemeovereuclideandomainsandapplicationstosecretimagesharing |
_version_ |
1725174937471156224 |